Skills

Discover and install skills to enhance Claude Code.

271 skills found - Clear filters

isms-audit-expert

davila7

Senior ISMS Audit Expert for internal and external information security management system auditing. Provides ISO 27001 audit expertise, security audit program management, security control assessment, and compliance verification. Use for ISMS internal auditing, external audit preparation, security control testing, and ISO 27001 certification support.

Security
3
0

netalertx-authentication-tokens

netalertx

Manage and troubleshoot API tokens and authentication-related secrets. Use this when you need to find, rotate, verify, or debug authentication issues (401/403) in NetAlertX.

Security
3
0

epic-security

epicweb-dev

Guide on security practices including CSP, rate limiting, and session security for Epic Stack

Security
3
0

aibtc-bitcoin-wallet

openclaw

Bitcoin L1 wallet for agents - check balances, send BTC, manage UTXOs. Extends to Stacks L2 (STX, DeFi) and Pillar smart wallets (sBTC yield).

Security
3
0

solana

openclaw

Solana wallet operations - create wallets, check balances, send SOL/tokens, swap via Jupiter, launch tokens on Pump.fun

Security
3
0

moltitude

openclaw

Mint verifiable receipts for AI agent work. Create cryptographic proof of tasks with Ed25519 signatures, SHA-256 hashing, and AI-powered verification scoring.

Security
3
0

supabase-rls-gen

openclaw

Generate Supabase RLS policies from Prisma schema. Use when securing database.

Security
3
0

idor-testing

Ed1s0nZ

IDOR不安全的直接对象引用测试的专业技能和方法论

Security
3
0

malware-analyst

sickn33

Expert malware analyst specializing in defensive malware research, threat intelligence, and incident response. Masters sandbox analysis, behavioral analysis, and malware family identification. Handles static/dynamic analysis, unpacking, and IOC extraction. Use PROACTIVELY for malware triage, threat hunting, incident response, or security research.

Security
3
0

skill-auditor

openclaw

Security scanner for Moltbot skills. Audits skills for security vulnerabilities, prompt injection, data exfiltration, obfuscation, and other threats before installation. Use when installing a new skill, asked to scan/audit a skill, or asked to check a skill's safety. Triggers automatically on skill install requests.

Security
3
0

testing-code

CaptainCrouton89

Write automated tests for features, validate functionality against acceptance criteria, and ensure code coverage. Use when writing test code, verifying functionality, or adding test coverage to existing code.

Security Coding
3
0

rate-limiting

benchflow-ai

Implement rate limiting to prevent brute force attacks, spam, and resource abuse. Use this skill when you need to protect endpoints from automated attacks, prevent API abuse, limit request frequency, or control infrastructure costs. Triggers include "rate limiting", "rate limit", "brute force", "prevent spam", "API abuse", "resource exhaustion", "DoS", "withRateLimit", "too many requests", "429 error".

Security
3
0

ton-vulnerability-scanner

trailofbits

Scans TON (The Open Network) smart contracts for 3 critical vulnerabilities including integer-as-boolean misuse, fake Jetton contracts, and forward TON without gas checks. Use when auditing FunC contracts.

Security Coding
2
0

django-patterns

affaan-m

Django架构模式、使用DRF的REST API设计、ORM最佳实践、缓存、信号、中间件以及生产级Django应用程序。

Security Coding
2
0

auth-bypass

yhy0

认证绕过漏洞检测与利用。当目标存在登录功能、权限控制、JWT/Session 认证时使用。包括 IDOR、越权访问等。

Security
2
0

flood-detection

benchflow-ai

Detect flood events by comparing water levels to thresholds. Use when determining if flooding occurred, counting flood days, aggregating instantaneous data to daily values, or classifying flood severity.

Security Data & Analytics
2
0

security-scanning-security-dependencies

sickn33

You are a security expert specializing in dependency vulnerability analysis, SBOM generation, and supply chain security. Scan project dependencies across ecosystems to identify vulnerabilities, assess risks, and recommend remediation.

Security
2
0

token-integration-analyzer

trailofbits

Token integration and implementation analyzer based on Trail of Bits' token integration checklist. Analyzes token implementations for ERC20/ERC721 conformity, checks for 20+ weird token patterns, assesses contract composition and owner privileges, performs on-chain scarcity analysis, and evaluates how protocols handle non-standard tokens. Context-aware for both token implementations and token integrations.

Security Coding
2
0

burpsuite-project-parser

trailofbits

Searches and explores Burp Suite project files (.burp) from the command line. Use when searching response headers or bodies with regex patterns, extracting security audit findings, dumping proxy history or site map data, or analyzing HTTP traffic captured in a Burp project.

Security
2
0

designing-tests

CloudAI-X

Designs and implements testing strategies for any codebase. Use when adding tests, improving coverage, setting up testing infrastructure, debugging test failures, or when asked about unit tests, integration tests, or E2E testing.

Security Coding
2
0

sentry-ci-integration

jeremylongshore

Manage integrate Sentry with CI/CD pipelines. Use when setting up GitHub Actions, GitLab CI, or other CI systems with Sentry releases and source maps. Trigger with phrases like "sentry github actions", "sentry CI", "sentry pipeline", "automate sentry releases".

Security
2
0
Previous Page 10 of 13 Next